SlideShare a Scribd company logo
How Safe Are Our Children
    On the Internet
           By
     Stephen Wright
What Are the Dangers
• Pornography
• Predators
• Cyber Bullying
• Viruses
• Social Networking
Pornography


• 60% of all websites are pornographic
• 1 in 4 children who use the Internet
  regularly, will be exposed to
  unwanted sexual material
Predators
• Pedophiles represent the most dangerous
  aspect of the Internet
• one in five children age 10-17 who regularly
  use the Internet have received a sexual
  solicitation
• Chat rooms and instant messages are two
  main tools pedophiles use to contact children
Cyber Bullying
• Cyber bullying is the use of technology to
  harass, threaten, embarrass, or target another
  person.
• One in three teens have been the victims of
  cyber bullying
• Severe cyber bullying can leave victims at
  greater risk for anxiety, depression, and other
  stress-related disorders.
Viruses
• Malicious programs include worms,
  macros, phishing, spam, and rootkits.
• These programs are designed to
  disrupt your computer, steel
  information and identities.
• Viruses can give hackers unwanted
  assess to you computer.
Social Networking
• Parents my feel a false sence of security when
  they see who their kids are friending on line.
• But that
  – Doesn't reveal key details about your child's
    friends
  – Forces you to wade through hours of teenaged
    gossip
  – May actually embarrass your child, even if you're
    well intentioned!
Strategies for Safe Internet Use
• Many internet providers offer child safe sites
  that will
  – Find out where your child has online accounts
  – Know who your child is "friends" with online
  – Get notified if your child posts about violence,
    suicide or drugs
  – See photos posted by or tagged with your child
Strategies for Safe Internet Use
• Be aware of what your children are doing
  online
• Look for changes in moods such as depression
• Keep firewalls in place and have good anti
  virus software.
• Don’t be afraid to limit access
• Keep informed on internet issues.
References
• Clear Traffic
  http://www.cleartraffic.com/keeping-kids-
  safe.htm
• Kid Health
  http://kidshealth.org/parent/positive/talk/cyb
  erbullying.html#
• COMPUTER VIRUSES by Markus Hanhisalo
  http://www.tml.tkk.fi/Opinnot/Tik-
  110.501/1997/viruses.html

More Related Content

What's hot

Internet Safety
Internet SafetyInternet Safety
Internet Safety
ccapozzoli
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
rowenick
 
Cyber Wellness Lesson Plan Presentation
Cyber Wellness Lesson Plan PresentationCyber Wellness Lesson Plan Presentation
Cyber Wellness Lesson Plan Presentation
Kai Sheng
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
Lawrence Fine
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
Ernest Staats
 

What's hot (17)

Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for Seniors
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyber Safe Parenting
Cyber Safe ParentingCyber Safe Parenting
Cyber Safe Parenting
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safety
 
Cyber Wellness Lesson Plan Presentation
Cyber Wellness Lesson Plan PresentationCyber Wellness Lesson Plan Presentation
Cyber Wellness Lesson Plan Presentation
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
 
Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention
 

Viewers also liked (6)

Wow that’s a billion by Sky Fox and Flying Eagle
Wow that’s a billion by Sky Fox and Flying EagleWow that’s a billion by Sky Fox and Flying Eagle
Wow that’s a billion by Sky Fox and Flying Eagle
 
Top twelve wright power point
Top twelve wright power pointTop twelve wright power point
Top twelve wright power point
 
Wow that’s a billion by Sky Eagle One
Wow that’s a billion by Sky Eagle OneWow that’s a billion by Sky Eagle One
Wow that’s a billion by Sky Eagle One
 
Wow that’s a billon by Frog One
Wow that’s a billon by Frog OneWow that’s a billon by Frog One
Wow that’s a billon by Frog One
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Dustin.r billion
Dustin.r billionDustin.r billion
Dustin.r billion
 

Similar to How safe are our children

Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and Chldren
Joe Drumgoole
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentation
QEwebAdmin
 

Similar to How safe are our children (20)

2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Perils of social media
Perils of social mediaPerils of social media
Perils of social media
 
Online safety
Online safetyOnline safety
Online safety
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet Safety
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and Chldren
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentation
 
Cyberbullying - The Big Problem
Cyberbullying - The Big ProblemCyberbullying - The Big Problem
Cyberbullying - The Big Problem
 
Bully
BullyBully
Bully
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 

More from stevewrightco (9)

36 things
36 things36 things
36 things
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Wow that’s a billon Frog One
Wow that’s a billon Frog OneWow that’s a billon Frog One
Wow that’s a billon Frog One
 
Wow that’s a billion by Sky Fox and Flying Eagle
Wow that’s a billion by Sky Fox and Flying EagleWow that’s a billion by Sky Fox and Flying Eagle
Wow that’s a billion by Sky Fox and Flying Eagle
 
Wow that’s a billon by Frog One
Wow that’s a billon by Frog OneWow that’s a billon by Frog One
Wow that’s a billon by Frog One
 
Wow that’s a billon by Frog One
Wow that’s a billon by Frog OneWow that’s a billon by Frog One
Wow that’s a billon by Frog One
 
Wow that’s a billion georgie and anna
Wow that’s a billion georgie and annaWow that’s a billion georgie and anna
Wow that’s a billion georgie and anna
 
Wow That's a BilloinSpeed Racer
Wow That's a BilloinSpeed RacerWow That's a BilloinSpeed Racer
Wow That's a BilloinSpeed Racer
 
Wow that’s a billion by Sky Eagle 1
Wow that’s a billion by Sky Eagle 1Wow that’s a billion by Sky Eagle 1
Wow that’s a billion by Sky Eagle 1
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 

How safe are our children

  • 1. How Safe Are Our Children On the Internet By Stephen Wright
  • 2. What Are the Dangers • Pornography • Predators • Cyber Bullying • Viruses • Social Networking
  • 3. Pornography • 60% of all websites are pornographic • 1 in 4 children who use the Internet regularly, will be exposed to unwanted sexual material
  • 4. Predators • Pedophiles represent the most dangerous aspect of the Internet • one in five children age 10-17 who regularly use the Internet have received a sexual solicitation • Chat rooms and instant messages are two main tools pedophiles use to contact children
  • 5. Cyber Bullying • Cyber bullying is the use of technology to harass, threaten, embarrass, or target another person. • One in three teens have been the victims of cyber bullying • Severe cyber bullying can leave victims at greater risk for anxiety, depression, and other stress-related disorders.
  • 6. Viruses • Malicious programs include worms, macros, phishing, spam, and rootkits. • These programs are designed to disrupt your computer, steel information and identities. • Viruses can give hackers unwanted assess to you computer.
  • 7. Social Networking • Parents my feel a false sence of security when they see who their kids are friending on line. • But that – Doesn't reveal key details about your child's friends – Forces you to wade through hours of teenaged gossip – May actually embarrass your child, even if you're well intentioned!
  • 8. Strategies for Safe Internet Use • Many internet providers offer child safe sites that will – Find out where your child has online accounts – Know who your child is "friends" with online – Get notified if your child posts about violence, suicide or drugs – See photos posted by or tagged with your child
  • 9. Strategies for Safe Internet Use • Be aware of what your children are doing online • Look for changes in moods such as depression • Keep firewalls in place and have good anti virus software. • Don’t be afraid to limit access • Keep informed on internet issues.
  • 10. References • Clear Traffic http://www.cleartraffic.com/keeping-kids- safe.htm • Kid Health http://kidshealth.org/parent/positive/talk/cyb erbullying.html# • COMPUTER VIRUSES by Markus Hanhisalo http://www.tml.tkk.fi/Opinnot/Tik- 110.501/1997/viruses.html